First published: Mon Nov 07 2022(Updated: )
The d8s-networking for python, as distributed on PyPI, included a potential code-execution backdoor inserted by a third party. A potential code execution backdoor inserted by third parties is the democritus-user-agents package. The affected version of d8s-htm is 0.1.0.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Democritus D8s-networking | =0.1.0 | |
=0.1.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-44053 presents a high risk due to the potential code execution backdoor that can compromise security.
To remediate CVE-2022-44053, it is recommended to remove d8s-networking version 0.1.0 and replace it with an unaffected version.
CVE-2022-44053 specifically affects the d8s-networking package version 0.1.0 distributed by Democritus.
The vulnerability in CVE-2022-44053 was introduced by a third party as a potential backdoor in the democritus-user-agents package.
The impact of CVE-2022-44053 includes the risk of unauthorized remote code execution, potentially leading to data breaches or system compromise.